Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2021-36160
A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).
Exploit prediction scoring system (EPSS) score
EPSS Score
0.006
EPSS Ranking
68.4%
CVSS Severity
CVSS v3 Score
7.5
CVSS v2 Score
5.0
References
http://httpd.apache.org/security/vulnerabilities_24.html
https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37%40%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/r73260f6ba9fb52e43d860905fc90462ba5a814afda2d011f32bbd41c%40%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7f2746e916ed370239bc1a1025e5ebbf345f79df9ea0ea39e44acfbb%40%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/r94a61a1517133a19dcf40016e87454ea86e355d06a0cec4c778530f3%40%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/ra1c05a392587bfe34383dffe1213edc425de8d4afc25b7cefab3e781%40%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/ra87a69d0703d09dc52b86e32b08f8d7327af10acdd5f577a4e82596a%40%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rb2341c8786d0f9924f5b666e82d8d170b4804f50a523d750551bef1a%40%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re4162adc051c1a0a79e7a24093f3776373e8733abaff57253fef341d%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/ree7519d71415ecdd170ff1889cab552d71758d2ba2904a17ded21a70%40%3Ccvs.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00016.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00016.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://security.gentoo.org/glsa/202208-20
https://security.netapp.com/advisory/ntap-20211008-0004/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
https://www.debian.org/security/2021/dsa-4982
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
http://httpd.apache.org/security/vulnerabilities_24.html
https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37%40%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/r73260f6ba9fb52e43d860905fc90462ba5a814afda2d011f32bbd41c%40%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7f2746e916ed370239bc1a1025e5ebbf345f79df9ea0ea39e44acfbb%40%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/r94a61a1517133a19dcf40016e87454ea86e355d06a0cec4c778530f3%40%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/ra1c05a392587bfe34383dffe1213edc425de8d4afc25b7cefab3e781%40%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/ra87a69d0703d09dc52b86e32b08f8d7327af10acdd5f577a4e82596a%40%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rb2341c8786d0f9924f5b666e82d8d170b4804f50a523d750551bef1a%40%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re4162adc051c1a0a79e7a24093f3776373e8733abaff57253fef341d%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/ree7519d71415ecdd170ff1889cab552d71758d2ba2904a17ded21a70%40%3Ccvs.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00016.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00016.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://security.gentoo.org/glsa/202208-20
https://security.netapp.com/advisory/ntap-20211008-0004/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
https://www.debian.org/security/2021/dsa-4982
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
Products affected by CVE-2021-36160
Apache
»
Http Server
»
Version:
2.4.30
cpe:2.3:a:apache:http_server:2.4.30
Apache
»
Http Server
»
Version:
2.4.31
cpe:2.3:a:apache:http_server:2.4.31
Apache
»
Http Server
»
Version:
2.4.32
cpe:2.3:a:apache:http_server:2.4.32
Apache
»
Http Server
»
Version:
2.4.33
cpe:2.3:a:apache:http_server:2.4.33
Apache
»
Http Server
»
Version:
2.4.34
cpe:2.3:a:apache:http_server:2.4.34
Apache
»
Http Server
»
Version:
2.4.35
cpe:2.3:a:apache:http_server:2.4.35
Apache
»
Http Server
»
Version:
2.4.36
cpe:2.3:a:apache:http_server:2.4.36
Apache
»
Http Server
»
Version:
2.4.37
cpe:2.3:a:apache:http_server:2.4.37
Apache
»
Http Server
»
Version:
2.4.38
cpe:2.3:a:apache:http_server:2.4.38
Apache
»
Http Server
»
Version:
2.4.39
cpe:2.3:a:apache:http_server:2.4.39
Apache
»
Http Server
»
Version:
2.4.40
cpe:2.3:a:apache:http_server:2.4.40
Apache
»
Http Server
»
Version:
2.4.41
cpe:2.3:a:apache:http_server:2.4.41
Apache
»
Http Server
»
Version:
2.4.42
cpe:2.3:a:apache:http_server:2.4.42
Apache
»
Http Server
»
Version:
2.4.43
cpe:2.3:a:apache:http_server:2.4.43
Apache
»
Http Server
»
Version:
2.4.44
cpe:2.3:a:apache:http_server:2.4.44
Apache
»
Http Server
»
Version:
2.4.45
cpe:2.3:a:apache:http_server:2.4.45
Apache
»
Http Server
»
Version:
2.4.46
cpe:2.3:a:apache:http_server:2.4.46
Apache
»
Http Server
»
Version:
2.4.47
cpe:2.3:a:apache:http_server:2.4.47
Apache
»
Http Server
»
Version:
2.4.48
cpe:2.3:a:apache:http_server:2.4.48
Netapp
»
Cloud Backup
»
Version:
N/A
cpe:2.3:a:netapp:cloud_backup:-
Netapp
»
Clustered Data Ontap
»
Version:
N/A
cpe:2.3:a:netapp:clustered_data_ontap:-
Netapp
»
Storagegrid
»
Version:
N/A
cpe:2.3:a:netapp:storagegrid:-
Oracle
»
Communications Cloud Native Core Network Function Cloud Native Environment
»
Version:
1.10.0
cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.10.0
Oracle
»
Enterprise Manager Base Platform
»
Version:
13.4.0.0
cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0
Oracle
»
Enterprise Manager Base Platform
»
Version:
13.5.0.0
cpe:2.3:a:oracle:enterprise_manager_base_platform:13.5.0.0
Oracle
»
Http Server
»
Version:
12.2.1.3.0
cpe:2.3:a:oracle:http_server:12.2.1.3.0
Oracle
»
Http Server
»
Version:
12.2.1.4.0
cpe:2.3:a:oracle:http_server:12.2.1.4.0
Oracle
»
Instantis Enterprisetrack
»
Version:
17.1
cpe:2.3:a:oracle:instantis_enterprisetrack:17.1
Oracle
»
Instantis Enterprisetrack
»
Version:
17.2
cpe:2.3:a:oracle:instantis_enterprisetrack:17.2
Oracle
»
Instantis Enterprisetrack
»
Version:
17.3
cpe:2.3:a:oracle:instantis_enterprisetrack:17.3
Oracle
»
Peoplesoft Enterprise Peopletools
»
Version:
8.58
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58
Oracle
»
Zfs Storage Appliance Kit
»
Version:
8.8
cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8
Broadcom
»
Brocade Fabric Operating System Firmware
»
Version:
N/A
cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-
Debian
»
Debian Linux
»
Version:
10.0
cpe:2.3:o:debian:debian_linux:10.0
Debian
»
Debian Linux
»
Version:
11.0
cpe:2.3:o:debian:debian_linux:11.0
Debian
»
Debian Linux
»
Version:
9.0
cpe:2.3:o:debian:debian_linux:9.0
Fedoraproject
»
Fedora
»
Version:
34
cpe:2.3:o:fedoraproject:fedora:34
Fedoraproject
»
Fedora
»
Version:
35
cpe:2.3:o:fedoraproject:fedora:35
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved